{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T13:06:38Z","timestamp":1773493598357,"version":"3.50.1"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2023,2,11]],"date-time":"2023-02-11T00:00:00Z","timestamp":1676073600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,2,11]],"date-time":"2023-02-11T00:00:00Z","timestamp":1676073600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61971007 & 61571013"],"award-info":[{"award-number":["61971007 & 61571013"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1007\/s11042-023-14501-2","type":"journal-article","created":{"date-parts":[[2023,2,11]],"date-time":"2023-02-11T06:20:20Z","timestamp":1676096420000},"page":"22723-22740","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Abnormal behavior detection algorithm based on multi-branch convolutional fusion neural network"],"prefix":"10.1007","volume":"82","author":[{"given":"Zheng","family":"Xu","sequence":"first","affiliation":[]},{"given":"Yuanyao","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,11]]},"reference":[{"key":"14501_CR1","doi-asserted-by":"crossref","unstructured":"Cheng KW, Chen YT, Fang WH (2015) Gaussian process regression-based video anomaly detection and localization with hierarchical feature representation. IEEE Trans Image Process 24(12):5288\u20135301","DOI":"10.1109\/TIP.2015.2479561"},{"key":"14501_CR2","doi-asserted-by":"crossref","unstructured":"Chong YS, Tay YH (2017) Abnormal event detection in videos using spatiotemporal autoencoder. In: International symposium on neural networks (ISNN), pp 189\u2013196","DOI":"10.1007\/978-3-319-59081-3_23"},{"key":"14501_CR3","unstructured":"Chung J, Gulcehre C, Cho KH et al (2014) Empirical evaluation of gated recurrent neural networks on sequence modeling[J]. Eprint Arxiv"},{"key":"14501_CR4","unstructured":"CNN.Smart cameras Spot Shady Behavior [EB\/OL] (2007\u201303\u201326). http:\/\/edition.cnn.com\/2007\/TECH\/science\/03\/26\/fs.behaviorcameras\/"},{"key":"14501_CR5","doi-asserted-by":"crossref","unstructured":"Cong Y, Yuan J, Liu J (2011) Sparse reconstruction cost for abnormal event detection. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp 3449\u20133456","DOI":"10.1109\/CVPR.2011.5995434"},{"key":"14501_CR6","unstructured":"Ji S, Xu W, Yang M, Yu K (2010) 3D convolutional neural networks for human action recognition. In: 27th International Conference on Machine Learning (ICML), pp 495\u2013502"},{"key":"14501_CR7","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S et al (2016) Deep residual learning for image recognition[J]. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp 770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"key":"14501_CR8","unstructured":"Hentoff N. 40 years of growing surveillance [EB\/OL] (2015-10-20). https:\/\/www.wnd.com\/2015\/10\/40-years-of-nsa-surveillance"},{"key":"14501_CR9","doi-asserted-by":"crossref","unstructured":"Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9(8):1735\u20131780","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"14501_CR10","unstructured":"Khurram S, Amir RZ, Mubarak S (2012) UCF101 dataset. https:\/\/www.crcv.ucf.edu\/research\/data-sets\/ucf101"},{"issue":"1","key":"14501_CR11","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1109\/TPAMI.2012.59","volume":"35","author":"S Ji","year":"2013","unstructured":"Ji S, Xu W, Yang M, Yu K (2013) 3D convolutional neural networks for human action recognition[J]. IEEE Trans Pattern Anal Mach Intell 35(1):221\u2013231","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"14501_CR12","unstructured":"Jia D et al (2009) ImageNet: a large-scale hierarchical image database. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp 248\u2013255"},{"key":"14501_CR13","doi-asserted-by":"crossref","unstructured":"Kim J, Grauman K (2009) Observe locally, infer globally: a space-time MRF for detecting abnormal activities with incremental updates. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp 2921\u20132928","DOI":"10.1109\/CVPR.2009.5206569"},{"key":"14501_CR14","doi-asserted-by":"crossref","unstructured":"Kratz L, Nishino K (2009) Anomaly detection in extremely crowded scenes using spatio-temporal motion pattern models. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp 1446\u20131453","DOI":"10.1109\/CVPR.2009.5206771"},{"key":"14501_CR15","doi-asserted-by":"crossref","unstructured":"Li W, Mahadevan V, Vasconcelos N (2013) Anomaly detection and localization in crowded scenes. IEEE Trans Pattern Anal Mach Intell 36(1):18\u201332","DOI":"10.1109\/TPAMI.2013.111"},{"key":"14501_CR16","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1016\/j.patcog.2018.04.022","volume":"81","author":"L Liu","year":"2018","unstructured":"Liu L, Wang S, Hu B, Qiong Q, Junhao W, Rosenblum David S (2018) Learning structures of interval-based Bayesian networks in probabilistic generative model for human complex activity recognition[J]. Pattern Recogn 81:545\u2013561","journal-title":"Pattern Recogn"},{"key":"14501_CR17","doi-asserted-by":"crossref","unstructured":"Luo W, Liu W, Gao S (2017) A revisit of sparse coding based anomaly detection in stacked rnn framework. In: IEEE international conference on computer vision (ICCV), pp 341\u2013349","DOI":"10.1109\/ICCV.2017.45"},{"key":"14501_CR18","doi-asserted-by":"crossref","unstructured":"Mehran R, Oyama A, Shah M (2009) Abnormal crowd behavior detection using social force model. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp 935\u2013942","DOI":"10.1109\/CVPR.2009.5206641"},{"key":"14501_CR19","unstructured":"Simonyan K, Zisserman A (2014) Two-stream convolutional networks for action recognition in videos. Adv Neural Inform Process Syst 1(January):568\u2013576"},{"key":"14501_CR20","unstructured":"Simonyan K, Zisserman A (2015) Very deep convolutional networks for large-scale image recognition. In: 3rd International Conference on Learning Representations (ICLR)"},{"key":"14501_CR21","doi-asserted-by":"crossref","unstructured":"Sultani W, Chen C, Shah M (2018) Real-world anomaly detection in surveillance videos. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp 6479\u20136488","DOI":"10.1109\/CVPR.2018.00678"},{"key":"14501_CR22","doi-asserted-by":"crossref","unstructured":"Szegedy C, Vanhoucke V, Ioffe S, et al (2016) Rethinking the inception architecture for computer vision[C]. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp 2818\u20132826","DOI":"10.1109\/CVPR.2016.308"},{"key":"14501_CR23","doi-asserted-by":"crossref","unstructured":"Xie S et al (2017) Aggregated residual transformations for deep neural networks. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp 5987\u20135995","DOI":"10.1109\/CVPR.2017.634"},{"key":"14501_CR24","unstructured":"Zaremba W, Sutskever I, Vinyals O (2014) Recurrent neural network regularization. Eprint Arxiv"},{"key":"14501_CR25","doi-asserted-by":"crossref","unstructured":"Zhao B, Fei-Fei L, Xing EP (2011) Online detection of unusual events in videos via dynamic sparse coding. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp 3313\u20133320","DOI":"10.1109\/CVPR.2011.5995524"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-14501-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-14501-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-14501-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T09:32:13Z","timestamp":1685439133000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-14501-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,11]]},"references-count":25,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["14501"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-14501-2","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,2,11]]},"assertion":[{"value":"12 August 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 April 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 January 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 February 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}